Bug Bounty
Burp suite’s Portswigger Launches Web Security Academy – Free Training for Finding Web Security Vulnerabilities
Portswigger launched Web Security Academy, a free new learning source that covers techniques and methods for exploiting the bugs and how to avoid them.The...
Computer Security
IRCTC Website Flaw Allow Hackers to Access All Your Private Info & Cancelling Booked Tickets
A new bug discovered in IRCTC website allows attackers to gain access to the lakhs of users private information and alter the sensitive data...
Checklist
Penetration Testing Checklist for Android, windows, Apple & Blackberry Phones
Here we are going to have a look about some of Common & important Penetration Testing Checklist for widely used OS Platforms for mobile...
PENTESTING
Penetration Testing Distribution BlackArch Linux 2018.06.01 Released With Powerful New Hacking Tools
A Penetration Testing OS BlackArch Linux 2018.06.01 Released with new ISOs and OVA image and set of high-quality updates for Penetration testers.BlackArch Linux is one...
PENTESTING
Parrot Security OS 4.0 Released With Number of New Powerful Tools and with Package Updates
Parrot Security OS 4.0 released with a number of new tools, updated for packages and bug fixes that released since the last version 3.11.Parrot...
PENTESTING
Exploit Pack V10.07 Released with More than 38.000+ Exploits Including Zero-Days
Exploit Pack is a well-integrated open source tool for conducting professional penetration tests. As like any other penetration testing tool it requires understanding and...
PENTESTING
Parrot Security OS New Released with a Collection of tools for Penetration Testing and Forensic Analysis
Parrot Security Operating System is a Penetration Testing & Forensics Distro dedicated to Ethical Hackers & Cyber Security Professionals.With the new release 3.9, it...
Network Pentesting
Metasploit Can Be Directly Used For Hardware Penetration Testing Now
Security researchers and penetration testers have used the open source Metasploit Framework to probe for vulnerabilities, run exploits, and simulate real-world attacks against software...